Prevent someone to change part(s) of the integral data of a secured object in the database and thus tricking the application to send sensitive information to a malicious application.
Approach
Each secured object defines which is its integral data and a processor calculates an integrity to be stored next to the object. Upon retrieval of the object, the integrity is calculated and is compared to the previously stored one.
Coverage decreased (-0.008%) to 86.985% when pulling f3983db2f77ae07a37856058310980c29a67f4a9 on credentials_integrity into cc278aa7e691daa3d71526c703f904827630187f on master.
Motivation
Prevent someone to change part(s) of the integral data of a secured object in the database and thus tricking the application to send sensitive information to a malicious application.
Approach
Each secured object defines which is its integral data and a processor calculates an integrity to be stored next to the object. Upon retrieval of the object, the integrity is calculated and is compared to the previously stored one.